
Audit
Infrastructure audit helps you to prepare an IT asset list and also provide all required details like device hardware information, on memory, processors, display adapters, motherboard details, protocols, services running etc. Combined with Vulnerability scanning service, the customer can check the known vulnerabilities existing in their network.
Key Features
Standard Events : The events log records three types of standard events.
Event Logs : Database logs can be queried from the user interface.